Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 UID: 0 PID: 280 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 kmemleak: Found object by alias at 0x607f1a639884 CPU: 0 UID: 0 PID: 3967 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lookup_object+0x94/0xb0 delete_object_full+0x27/0x70 free_percpu+0x30/0x1160 futex_hash_free+0x38/0xc0 mmput+0x2d3/0x390 do_exit+0x79d/0x2970 do_group_exit+0xd3/0x2a0 get_signal+0x2315/0x2340 arch_do_signal_or_restart+0x80/0x790 exit_to_user_mode_loop+0x8b/0x110 do_syscall_64+0x2f7/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f091ae99b19 Code: Unable to access opcode bytes at 0x7f091ae99aef. RSP: 002b:00007f091840f218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 00007f091afacf68 RCX: 00007f091ae99b19 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f091afacf6c RBP: 00007f091afacf60 R08: 0000000000000016 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f091afacf6c R13: 00007fff6b34467f R14: 00007f091840f300 R15: 0000000000022000 kmemleak: Object (percpu) 0x607f1a639880 (size 8): kmemleak: comm "syz-executor.3", pid 3962, jiffies 4294790846 kmemleak: min_count = 1 kmemleak: count = 0 kmemleak: flags = 0x21 kmemleak: checksum = 0 kmemleak: backtrace: pcpu_alloc_noprof+0x87a/0x1170 fib_nh_common_init+0x30/0xd0 fib6_nh_init+0x968/0x1a00 ip6_route_info_create_nh+0x530/0xf80 addrconf_f6i_alloc+0x208/0x430 __ipv6_dev_ac_inc+0x2fc/0xd80 ipv6_sock_ac_join+0x8aa/0x1100 do_ipv6_setsockopt+0x3f54/0x47b0 ipv6_setsockopt+0xcb/0x170 udpv6_setsockopt+0x84/0xd0 do_sock_setsockopt+0xf7/0x1e0 __sys_setsockopt+0x11f/0x1a0 __x64_sys_setsockopt+0xbe/0x160 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0010:dst_dev_put+0x21/0x250 Code: 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 54 55 53 48 89 fb e8 40 c6 a8 fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 b5 01 00 00 48 8d 7b 3a 48 8b 2b 48 b8 00 00 00 RSP: 0018:ffff88806cf08da0 EFLAGS: 00010256 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffffff84103a71 RDX: 0000000000000000 RSI: ffffffff83cb2140 RDI: 0000000000000001 RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000001 R12: fffffbfff0b0a4ac R13: 0000607f1a639880 R14: 0000607f1a639880 R15: 0000000000000001 FS: 000055558dcb6400(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2d226000 CR3: 0000000039181000 CR4: 0000000000350ef0 Call Trace: rt_fibinfo_free_cpus.part.0+0xdb/0x1a0 fib_nh_common_release+0xa8/0x2c0 fib6_info_destroy_rcu+0x18b/0x1f0 rcu_core+0x7c8/0x1800 handle_softirqs+0x1b1/0x770 __irq_exit_rcu+0xc4/0x100 irq_exit_rcu+0x9/0x20 sysvec_apic_timer_interrupt+0x70/0x80 asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:__sanitizer_cov_trace_pc+0x8/0x80 Code: 4a 03 48 c7 c0 f4 ff ff ff eb 92 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 34 24 <65> 48 8b 15 88 48 10 06 65 8b 05 99 48 10 06 a9 00 01 ff 00 74 27 RSP: 0018:ffff888013e376b8 EFLAGS: 00000202 RAX: 0000000000000003 RBX: 0000000000000000 RCX: ffffffff819e524b RDX: 0000000000000000 RSI: ffffffff819e4738 RDI: 0000000000000001 RBP: ffff888013e37938 R08: 0000000000000000 R09: fffff9400018fee0 R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 R13: ffffea0000c7f700 R14: ffffea0000c7f700 R15: dffffc0000000000 copy_page_range+0x1418/0x5140 dup_mmap+0xd2f/0x1d10 copy_process+0x3ad5/0x73c0 kernel_clone+0xea/0x7f0 __do_sys_clone+0xce/0x120 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f47be28310b Code: ed 0f 85 60 01 00 00 64 4c 8b 0c 25 10 00 00 00 45 31 c0 4d 8d 91 d0 02 00 00 31 d2 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 89 00 00 00 41 89 c5 85 c0 0f 85 90 00 00 RSP: 002b:00007ffc90bcdd40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f47be28310b RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 0000000000000001 R08: 0000000000000000 R09: 000055558dcb6400 R10: 000055558dcb66d0 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffc90bcde20 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:dst_dev_put+0x21/0x250 Code: 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 54 55 53 48 89 fb e8 40 c6 a8 fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 b5 01 00 00 48 8d 7b 3a 48 8b 2b 48 b8 00 00 00 RSP: 0018:ffff88806cf08da0 EFLAGS: 00010256 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffffff84103a71 RDX: 0000000000000000 RSI: ffffffff83cb2140 RDI: 0000000000000001 RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000001 R12: fffffbfff0b0a4ac R13: 0000607f1a639880 R14: 0000607f1a639880 R15: 0000000000000001 FS: 000055558dcb6400(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2d226000 CR3: 0000000039181000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 90 nop 3: 90 nop 4: 90 nop 5: 90 nop 6: 90 nop 7: 90 nop 8: 90 nop 9: f3 0f 1e fa endbr64 d: 41 54 push %r12 f: 55 push %rbp 10: 53 push %rbx 11: 48 89 fb mov %rdi,%rbx 14: e8 40 c6 a8 fd callq 0xfda8c659 19: 48 89 da mov %rbx,%rdx 1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 23: fc ff df 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 b5 01 00 00 jne 0x1e9 34: 48 8d 7b 3a lea 0x3a(%rbx),%rdi 38: 48 8b 2b mov (%rbx),%rbp 3b: 48 rex.W 3c: b8 .byte 0xb8 3d: 00 00 add %al,(%rax)